File Name |
File Size |
Last Modified |
MD5 Checksum |
aimrape.tar.gz | 11133 | Oct 3 23:04:46 2001 | c1eac4de81c5497037961f7de9f51d4e |
Aimrape is a remote denial of service exploit for AOL Instant Messenger (AIM) v4.7.2480 and below. Homepage: http://sec.angrypacket.com. By Methodic |
cso.c | 4602 | Sep 10 21:14:51 2001 | bca688c3d593da49eb33f09d20d27877 |
Cso.c is a remote exploit for cgicso included with cgiemail 1.6. Tested on Slackware Linux 7.1 running Apache 1.3.20. Homepage: http://www.hhp-programming.net. By Ben Schultz |
DoSadsl812.java | 3918 | Sep 11 10:08:55 2001 | 36a23d0969a3dfa812dc12aef2354cab |
Denial of service attack against a 3com ADSL 812 router in Java. Resets the router without any password, as described here. By Magnetic |
km.pl | 1647 | Sep 12 09:02:43 2001 | 37d8b33d6f5e3d0b8f357405a0f0a59b |
Kazaa and Morpheus remote denial of service exploit in perl - Floods the server using non-rate limited shared folder connections. By Paul Godfrey |
maj1944-xpl.pl | 2839 | Sep 28 09:23:28 2001 | 93542c2ce8283244257ff38ed13f553c |
Majordomo v1.94.4 local exploit in perl. Binds a shell to port 1234 with uid=Majordomo. By Nemes||y |
majordomo.1.94.4.txt | 4582 | Sep 18 19:42:41 2001 | f6097b21c3e3084814496027e4c89aad |
Majordomo v1.94.4 contains vulnerabilities which allow local users to obtain a uid=majordomo shell. Homepage: http://ws.obit.nl. By Marco van Berkum |
oracle.9i.path.txt | 1205 | Sep 18 19:23:14 2001 | 03c1cfbb8ebb0f71cef657b855fb25dc |
The Oracle 9i Application Server uses the Apache web server for HTTP service. However, if a request is made for a non-existent .jsp file, the complete path is shown. By KK Mookhey |
qpopper.pl | 1141 | Sep 3 14:27:17 2001 | b84cd17517203b65b5ed2cd4fe7002e7 |
Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x. By Nemes||y |
rdC-cr2abuse.tgz | 2694 | Sep 11 10:42:52 2001 | 3961bb92858e36a6743c5afc12a8b11e |
A code red mass fix/abuse tool. Homepage: http://www.rdcrew.com.ar. By Venomous |